Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.136.50.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.136.50.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 10:49:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 220.50.136.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.50.136.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.106.32 attack
SSH Invalid Login
2020-05-08 05:52:03
180.243.106.226 attackbotsspam
1588871861 - 05/07/2020 19:17:41 Host: 180.243.106.226/180.243.106.226 Port: 445 TCP Blocked
2020-05-08 05:56:09
49.88.112.75 attackbotsspam
May 07 2020, 21:56:33 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-05-08 05:57:09
162.243.253.67 attack
May  7 14:47:53 ny01 sshd[14454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.253.67
May  7 14:47:55 ny01 sshd[14454]: Failed password for invalid user rony from 162.243.253.67 port 49141 ssh2
May  7 14:51:04 ny01 sshd[14815]: Failed password for root from 162.243.253.67 port 35227 ssh2
2020-05-08 06:15:10
182.75.115.62 attackspambots
May  7 17:47:37 ny01 sshd[7372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.115.62
May  7 17:47:38 ny01 sshd[7372]: Failed password for invalid user lijin from 182.75.115.62 port 36488 ssh2
May  7 17:52:03 ny01 sshd[7992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.115.62
2020-05-08 06:21:49
222.186.175.183 attack
May  7 23:56:51 home sshd[26979]: Failed password for root from 222.186.175.183 port 23080 ssh2
May  7 23:56:54 home sshd[26979]: Failed password for root from 222.186.175.183 port 23080 ssh2
May  7 23:57:04 home sshd[26979]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 23080 ssh2 [preauth]
...
2020-05-08 06:02:26
51.158.162.242 attackbots
2020-05-07T20:20:40.653517vps773228.ovh.net sshd[6014]: Invalid user comfort from 51.158.162.242 port 50482
2020-05-07T20:20:40.667758vps773228.ovh.net sshd[6014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.162.242
2020-05-07T20:20:40.653517vps773228.ovh.net sshd[6014]: Invalid user comfort from 51.158.162.242 port 50482
2020-05-07T20:20:42.783700vps773228.ovh.net sshd[6014]: Failed password for invalid user comfort from 51.158.162.242 port 50482 ssh2
2020-05-07T20:25:37.175221vps773228.ovh.net sshd[6072]: Invalid user tullo from 51.158.162.242 port 59686
...
2020-05-08 05:46:30
49.73.84.175 attack
2020-05-07T20:18:44.402662vps751288.ovh.net sshd\[6430\]: Invalid user jessica from 49.73.84.175 port 36926
2020-05-07T20:18:44.411031vps751288.ovh.net sshd\[6430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.84.175
2020-05-07T20:18:46.265987vps751288.ovh.net sshd\[6430\]: Failed password for invalid user jessica from 49.73.84.175 port 36926 ssh2
2020-05-07T20:21:41.911806vps751288.ovh.net sshd\[6479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.84.175  user=root
2020-05-07T20:21:44.734992vps751288.ovh.net sshd\[6479\]: Failed password for root from 49.73.84.175 port 42036 ssh2
2020-05-08 05:53:21
200.11.192.2 attackspambots
(sshd) Failed SSH login from 200.11.192.2 (VE/Venezuela/200-11-192-2.static.cantv.net): 5 in the last 3600 secs
2020-05-08 06:21:18
189.160.162.222 attackbotsspam
1588871879 - 05/07/2020 19:17:59 Host: 189.160.162.222/189.160.162.222 Port: 445 TCP Blocked
2020-05-08 05:50:42
104.248.120.23 attack
2020-05-07T18:41:42.115884homeassistant sshd[20056]: Invalid user user3 from 104.248.120.23 port 57834
2020-05-07T18:41:42.126045homeassistant sshd[20056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.120.23
...
2020-05-08 06:08:09
202.40.181.99 attackspam
May  7 21:32:16 localhost sshd\[13134\]: Invalid user debian from 202.40.181.99 port 31276
May  7 21:32:16 localhost sshd\[13134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.40.181.99
May  7 21:32:19 localhost sshd\[13134\]: Failed password for invalid user debian from 202.40.181.99 port 31276 ssh2
...
2020-05-08 05:44:46
187.163.121.86 attackspam
Port scan on 1 port(s): 23
2020-05-08 05:58:51
222.186.31.166 attackspambots
May  7 23:45:07 host sshd[29618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
May  7 23:45:09 host sshd[29618]: Failed password for root from 222.186.31.166 port 40255 ssh2
...
2020-05-08 05:49:22
123.206.69.58 attackspambots
May  7 16:08:26 r.ca sshd[5700]: Failed password for invalid user guest from 123.206.69.58 port 58920 ssh2
2020-05-08 06:22:19

Recently Reported IPs

241.147.199.209 77.97.197.246 44.99.131.117 188.184.91.180
176.23.68.101 209.252.20.30 98.49.127.53 96.218.233.53
82.24.0.247 81.185.152.26 138.182.253.102 195.7.205.34
185.169.149.221 132.179.194.123 106.86.171.103 73.63.126.44
125.252.27.120 27.147.123.25 121.149.93.3 240.254.176.32